Thrombolysis 发表于 2025-3-27 00:03:45

http://reply.papertrans.cn/47/4660/465902/465902_31.png

临时抱佛脚 发表于 2025-3-27 02:52:19

http://reply.papertrans.cn/47/4660/465902/465902_32.png

CRANK 发表于 2025-3-27 07:36:13

http://reply.papertrans.cn/47/4660/465902/465902_33.png

EWE 发表于 2025-3-27 09:47:43

Study on Advanced Botnet Based on Publicly Available Resourcescurity, defenders take more attention on advanced botnet designs that could be used by botmasters. In this paper, we design an advanced botnet based on publicly available resources, and implement its prototype system, which is named as PR-Bot. First of all, in terms of system design, PR-Bot is compl

ARENA 发表于 2025-3-27 13:37:34

Deep Packet Inspection with Delayed Signature Matching in Network Auditingature matching, and many researchers focus on improving the signature matching algorithms. In this paper, we work from a different angle: the scheduling of signature matching. We propose a method called Delayed Signature Matching (DSM), which could greatly reduce the number of matching attempts. In

Expediency 发表于 2025-3-27 20:07:50

Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysisvictim. Although many LDoS attack detection methods have been proposed, LDoS attacks are still difficult to accurately detect due to their low rate and good concealment. In this paper, we propose a novel method to detect LDoS attacks based on the fact that TCP traffic under LDoS attacks is more disc

行乞 发表于 2025-3-28 01:18:50

On the Weakness of Constant Blinding PRNG in Flash Playerlinding mechanism in Flash Player and analyse the weakness in its pseudo random number generator (PRNG). We demonstrate how such weakness can be exploited to recover the seed value in PRNG, thus bypass the constant blinding in Flash Player..We propose two methods to circumvent constant blinding in F

衰弱的心 发表于 2025-3-28 03:26:16

http://reply.papertrans.cn/47/4660/465902/465902_38.png

爱国者 发表于 2025-3-28 07:44:24

http://reply.papertrans.cn/47/4660/465902/465902_39.png

gait-cycle 发表于 2025-3-28 10:57:13

Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain Multiplication up the encryption process by optimizing the very large asymmetric multiplications required. A frequency domain approach is adopted for the multiplication using the Number Theoretic Transforms (NTTs) where the strict relationship between the NTT parameters is relaxed to allow for more optimized hard
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Information and Communications Security; 20th International C David Naccache,Shouhuai Xu,Ahmed Meddahi Conference proceedings 2018 Springer